This 18 April 2012 post from the NSA internal newsletter SSO Weekly reveals that AT&T (FAIRVIEW) cooperated with the NSA, under the terms of a FISA court order, to enable the agency to surveil the internet traffic going to and from the United Nations headquarters in New York: see the New York Times article AT&T […]

This NSA technical memo from April 2013 describes deployments of agency personnel to the facility codenamed TITANPOINTE: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.

This internal document for NSA employees dated 6 February 2013 provides a guide for visiting facilities related with the FAIRVIEW programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.

This NSA intranet post dated 14 March 2011 describes how Facebook collection capabilities have been augmented with the help of corporate partner BLARNEY (AT&T) and the FBI: see the book No Place To Hide, 13 May 2014.

This internal document for NSA employees dated 15 April 2011 provides a guide for visiting facilities related with the BLARNEY programme, including the TITANPOINTE building in New York City: see the Intercept article Titanpointe: The NSA’s Spy Hub in New York, Hidden in Plain View, 16 November 2016.

﻿SECRET//COMINT//REL TO USA, AUS, CAN, GBR, NZL//20291123
(U//FOUO) BLARNEY PROGRAM TDY HANDBOOK
A Guide For Traveling To Sites (U//FOUO)
As of 15 April 2011
(U) The purpose of this TDY...

This slide, taken from an April 2013 presentation from NSA Special Source Operations, reveals the role played by the agency’s partnership with AT&T (BLARNEY) in surveilling the United Nations: see the book No Place To Hide, 13 May 2014.

This NSA report dated 11 April 2014 describes the difficulties with the network switches the agency had compromised on Cisco devices in order to collect data from Cisco customers: see the book No Place To Hide, 13 May 2014.

This excerpt from the 14 March 2013 edition of internal NSA newsletter SSO Weekly describes an incident on 12 March where “unwitting” contractors discovered a cable tap known as WHARPDRIVE, which had to be discreetly reinstalled and provides details about the Breckenridge access point that corroborate the identification of the NSA’s corporate partner STORMBREW as […]

﻿UNCLASSIFIED//FOR OFFICIAL USE ONLY
14 MARCH 2013
Special
Source
Operations
Watkly
UNCLASSIFIED//FOR OFFICIAL USE ONLY
UNCLASSIFIED//FOR OFFICIAL USE ONLY
(U) CORPORATE TEAM
...

This NSA memo from 23 March 2012 presentation describes the agency’s proposal for a fourth FAA 702 certification that would allow it to target hackers “tied to malicious cyber activity”: see the New York Times article Hunting for Hackers, N.S.A. Secretly Expands Internet Spying at U.S. Border, 4 June 2015.

﻿(TS//SI//NF) New FAA702 Certification in the Works - Cyber Threat
By on 2012-03-23 1423
(TS//SI//NF) NSA has drafted a new FAA702 Certification to target
Cyber Threats. It is close to being r...

This undated NSA Special Source Operations presentation describes the agency’s relationship with corporate partner AT&T, codenamed FAIRVIEW: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.

This NSA classification guide from 2004 outlines the sensitivity of various aspects of the agency’s WHIPGENIE relationships with US corporate partners: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.

This internal NSA briefing dated 20 May 2010 shows US diplomatic personnel ‘reaching out’ for signals intelligence to give them an edge in international negotiations and the extent of the agency’s assistance: see the book No Place To Hide, 13 May 2014.

﻿Page 143
(S//SI) BLARNEY Team Provides Outstanding Support to Enable
UN Security Council Collection
(TS//SI//NF) With the UN vote on sanctions against Iran
approaching and several countrie...

This extract is from an undated dictionary produced by NSA Special Source Operations, provides glosses for several terms associated with the corporate partner FAIRVIEW, including the AT&T-specific term ‘SNRC’: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.

﻿LITHIUM (TS//SI//NF) BLARNEY'S covername for one of their corporate
partners. Need WPG ECI for company name
NODDY-3 (TS//SI//NF) FAIRVIEW'S covername for Coverage of Current
and Forecasted NR...

This NSA Special Source Operations presentation from 22 March 2013 supplies a detail about the Breckenridge access point that supports the identification of the corporate partner codenamed STORMBREW as US telecommunications company Verizon: see the New York Times article AT&T Helped U.S. Spy on Internet on a Vast Scale, 15 August 2015.

﻿TOP SECRET//COMINT//NOFORN
TOP SECRET//COMINT//NOFORN
TOPSECRET//SI//REL USA,
Cyber Threats and
Special Source Operations
A Current Perspective for NTOC
March 22 2013
Classified...

This undated NSA presentation, presented together with speaking notes, provides an introduction to the main cable access programmes facilitated by the agency’s corporate partners and specifies the relevant SIGADs: see the book No Place to Hide, 13 May 2014.

This document outlines the NSA activities designated as “exceptionally controlled information”, which are only made known to a small number of US officials: see the Intercept article Core Secrets: NSA Saboteurs in China and Germany, 10 October 2014.